tunnelkit/TunnelKit/Sources/Core/SessionProxy.swift

1256 lines
42 KiB
Swift
Raw Normal View History

2018-08-23 08:19:25 +00:00
//
// SessionProxy.swift
// TunnelKit
2018-08-23 08:19:25 +00:00
//
// Created by Davide De Rosa on 2/3/17.
2019-03-09 10:44:18 +00:00
// Copyright (c) 2019 Davide De Rosa. All rights reserved.
//
// https://github.com/keeshux
//
// This file is part of TunnelKit.
//
// TunnelKit is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// TunnelKit is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with TunnelKit. If not, see <http://www.gnu.org/licenses/>.
//
// This file incorporates work covered by the following copyright and
// permission notice:
//
// Copyright (c) 2018-Present Private Internet Access
//
// Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
2018-08-23 08:19:25 +00:00
//
import Foundation
import SwiftyBeaver
2018-08-23 10:09:44 +00:00
import __TunnelKitNative
2018-08-23 08:19:25 +00:00
private let log = SwiftyBeaver.self
/// Observes major events notified by a `SessionProxy`.
public protocol SessionProxyDelegate: class {
/**
Called after starting a session.
- Parameter remoteAddress: The address of the VPN server.
- Parameter reply: The compound `SessionReply` containing tunnel settings.
2018-08-23 08:19:25 +00:00
*/
func sessionDidStart(_: SessionProxy, remoteAddress: String, reply: SessionReply)
2018-08-23 08:19:25 +00:00
/**
Called after stopping a session.
- Parameter shouldReconnect: When `true`, the session can/should be restarted. Usually because the stop reason was recoverable.
- Seealso: `SessionProxy.reconnect(...)`
*/
func sessionDidStop(_: SessionProxy, shouldReconnect: Bool)
}
/// Provides methods to set up and maintain an OpenVPN session.
public class SessionProxy {
private enum StopMethod {
case shutdown
case reconnect
}
private struct Caches {
static let ca = "ca.pem"
static let clientCertificate = "cert.pem"
static let clientKey = "key.pem"
}
2018-08-23 08:19:25 +00:00
// MARK: Configuration
/// The session base configuration.
public let configuration: Configuration
2018-08-23 08:19:25 +00:00
/// The optional credentials.
public var credentials: Credentials?
private var keepAliveInterval: TimeInterval? {
let interval: TimeInterval?
if let negInterval = pushReply?.options.keepAliveInterval, negInterval > 0 {
interval = TimeInterval(negInterval)
} else if let cfgInterval = configuration.keepAliveInterval, cfgInterval > 0.0 {
interval = cfgInterval
} else {
return nil
}
return interval
}
2018-08-23 08:19:25 +00:00
/// An optional `SessionProxyDelegate` for receiving session events.
public weak var delegate: SessionProxyDelegate?
// MARK: State
private let queue: DispatchQueue
private var tlsObserver: NSObjectProtocol?
private var keys: [UInt8: SessionKey]
private var oldKeys: [SessionKey]
private var negotiationKeyIdx: UInt8
private var currentKeyIdx: UInt8?
private var negotiationKey: SessionKey {
guard let key = keys[negotiationKeyIdx] else {
fatalError("Keys are empty or index \(negotiationKeyIdx) not found in \(keys.keys)")
}
return key
}
private var currentKey: SessionKey? {
guard let i = currentKeyIdx else {
return nil
}
return keys[i]
}
private var link: LinkInterface?
private var tunnel: TunnelInterface?
private var isReliableLink: Bool {
return link?.isReliable ?? false
}
2019-04-16 21:55:50 +00:00
private var continuatedPushReplyMessage: String?
private var pushReply: SessionReply?
2018-08-23 08:19:25 +00:00
private var nextPushRequestDate: Date?
private var connectedDate: Date?
2018-09-09 12:55:14 +00:00
private var lastPing: BidirectionalState<Date>
2018-08-23 08:19:25 +00:00
private var isStopping: Bool
/// The optional reason why the session stopped.
public private(set) var stopError: Error?
// MARK: Control
private var controlChannel: ControlChannel
2018-08-23 08:19:25 +00:00
private var authenticator: Authenticator?
// MARK: Caching
private let cachesURL: URL
private var caURL: URL {
return cachesURL.appendingPathComponent(Caches.ca)
}
private var clientCertificateURL: URL {
return cachesURL.appendingPathComponent(Caches.clientCertificate)
}
private var clientKeyURL: URL {
return cachesURL.appendingPathComponent(Caches.clientKey)
}
2018-08-23 08:19:25 +00:00
// MARK: Init
/**
Creates a VPN session.
- Parameter queue: The `DispatchQueue` where to run the session loop.
- Parameter configuration: The `SessionProxy.Configuration` to use for this session.
2018-08-23 08:19:25 +00:00
*/
public init(queue: DispatchQueue, configuration: Configuration, cachesURL: URL) throws {
guard let ca = configuration.ca else {
throw ConfigurationError.missingConfiguration(option: "ca")
}
2018-08-23 08:19:25 +00:00
self.queue = queue
self.configuration = configuration
self.cachesURL = cachesURL
2018-08-23 08:19:25 +00:00
keys = [:]
oldKeys = []
negotiationKeyIdx = 0
2018-09-09 12:55:14 +00:00
lastPing = BidirectionalState(withResetValue: Date.distantPast)
2018-08-23 08:19:25 +00:00
isStopping = false
if let tlsWrap = configuration.tlsWrap {
switch tlsWrap.strategy {
2018-10-02 07:40:04 +00:00
case .auth:
controlChannel = try ControlChannel(withAuthKey: tlsWrap.key, digest: configuration.fallbackDigest)
2018-10-07 14:21:22 +00:00
case .crypt:
controlChannel = try ControlChannel(withCryptKey: tlsWrap.key)
}
} else {
controlChannel = ControlChannel()
}
// cache PEMs locally (mandatory for OpenSSL)
let fm = FileManager.default
try ca.pem.write(to: caURL, atomically: true, encoding: .ascii)
if let container = configuration.clientCertificate {
try container.pem.write(to: clientCertificateURL, atomically: true, encoding: .ascii)
} else {
try? fm.removeItem(at: clientCertificateURL)
}
if let container = configuration.clientKey {
try container.pem.write(to: clientKeyURL, atomically: true, encoding: .ascii)
} else {
try? fm.removeItem(at: clientKeyURL)
}
2018-08-23 08:19:25 +00:00
}
2019-04-02 17:18:23 +00:00
/// :nodoc:
2018-08-23 08:19:25 +00:00
deinit {
cleanup()
let fm = FileManager.default
for url in [caURL, clientCertificateURL, clientKeyURL] {
try? fm.removeItem(at: url)
}
2018-08-23 08:19:25 +00:00
}
// MARK: Public interface
/**
Establishes the link interface for this session. The interface must be up and running for sending and receiving packets.
- Precondition: `link` is an active network interface.
- Postcondition: The VPN negotiation is started.
- Parameter link: The `LinkInterface` on which to establish the VPN session.
*/
public func setLink(_ link: LinkInterface) {
guard (self.link == nil) else {
log.warning("Link interface already set!")
return
}
log.debug("Starting VPN session")
// WARNING: runs in notification source queue (we know it's "queue", but better be safe than sorry)
tlsObserver = NotificationCenter.default.addObserver(forName: .TLSBoxPeerVerificationError, object: nil, queue: nil) { (notification) in
let error = notification.userInfo?[TunnelKitErrorKey] as? Error
2018-08-23 08:19:25 +00:00
self.queue.async {
self.deferStop(.shutdown, error)
2018-08-23 08:19:25 +00:00
}
}
self.link = link
start()
}
/**
Returns `true` if the current session can rebind to a new link with `rebindLink(...)`.
- Returns: `true` if supports link rebinding.
*/
public func canRebindLink() -> Bool {
// return (pushReply?.peerId != nil)
2019-03-25 09:37:15 +00:00
// FIXME: floating is currently unreliable
return false
2018-08-23 08:19:25 +00:00
}
/**
Rebinds the session to a new link if supported.
- Precondition: `link` is an active network interface.
- Postcondition: The VPN session is active.
- Parameter link: The `LinkInterface` on which to establish the VPN session.
- Seealso: `canRebindLink()`.
*/
public func rebindLink(_ link: LinkInterface) {
guard let _ = pushReply?.options.peerId else {
2018-08-23 08:19:25 +00:00
log.warning("Session doesn't support link rebinding!")
return
}
isStopping = false
stopError = nil
log.debug("Rebinding VPN session to a new link")
self.link = link
loopLink()
}
/**
Establishes the tunnel interface for this session. The interface must be up and running for sending and receiving packets.
- Precondition: `tunnel` is an active network interface.
- Postcondition: The VPN data channel is open.
- Parameter tunnel: The `TunnelInterface` on which to exchange the VPN data traffic.
*/
public func setTunnel(tunnel: TunnelInterface) {
guard (self.tunnel == nil) else {
log.warning("Tunnel interface already set!")
return
}
self.tunnel = tunnel
loopTunnel()
}
/**
Returns the current data bytes count.
- Returns: The current data bytes count as a pair, inbound first.
*/
public func dataCount() -> (Int, Int)? {
guard let _ = link else {
return nil
}
return controlChannel.currentDataCount()
}
2018-08-23 08:19:25 +00:00
/**
Shuts down the session with an optional `Error` reason. Does nothing if the session is already stopped or about to stop.
- Parameter error: An optional `Error` being the reason of the shutdown.
*/
public func shutdown(error: Error?) {
guard !isStopping else {
log.warning("Ignore stop request, already stopping!")
return
}
deferStop(.shutdown, error)
}
/**
Shuts down the session with an optional `Error` reason and signals a reconnect flag to `SessionProxyDelegate.sessionDidStop(...)`. Does nothing if the session is already stopped or about to stop.
- Parameter error: An optional `Error` being the reason of the shutdown.
- Seealso: `SessionProxyDelegate.sessionDidStop(...)`
*/
public func reconnect(error: Error?) {
guard !isStopping else {
log.warning("Ignore stop request, already stopping!")
return
}
deferStop(.reconnect, error)
}
// Ruby: cleanup
/**
Cleans up the session resources.
*/
public func cleanup() {
log.info("Cleaning up...")
if let observer = tlsObserver {
NotificationCenter.default.removeObserver(observer)
tlsObserver = nil
}
keys.removeAll()
oldKeys.removeAll()
negotiationKeyIdx = 0
currentKeyIdx = nil
nextPushRequestDate = nil
connectedDate = nil
authenticator = nil
2019-04-16 21:55:50 +00:00
continuatedPushReplyMessage = nil
pushReply = nil
2018-08-23 08:19:25 +00:00
link = nil
if !(tunnel?.isPersistent ?? false) {
tunnel = nil
}
isStopping = false
stopError = nil
}
// MARK: Loop
// Ruby: start
private func start() {
loopLink()
hardReset()
}
private func loopNegotiation() {
guard let link = link else {
return
}
guard !keys.isEmpty else {
return
}
guard !negotiationKey.didHardResetTimeOut(link: link) else {
doReconnect(error: SessionError.negotiationTimeout)
return
}
guard !negotiationKey.didNegotiationTimeOut(link: link) else {
doShutdown(error: SessionError.negotiationTimeout)
return
}
pushRequest()
if !isReliableLink {
flushControlQueue()
}
2018-08-23 08:19:25 +00:00
guard negotiationKey.controlState == .connected else {
2018-08-23 08:19:25 +00:00
queue.asyncAfter(deadline: .now() + CoreConfiguration.tickInterval) { [weak self] in
self?.loopNegotiation()
}
return
}
// let loop die when negotiation is complete
}
// Ruby: udp_loop
private func loopLink() {
let loopedLink = link
loopedLink?.setReadHandler(queue: queue) { [weak self] (newPackets, error) in
guard loopedLink === self?.link else {
log.warning("Ignoring read from outdated LINK")
return
}
if let error = error {
log.error("Failed LINK read: \(error)")
return
}
if let packets = newPackets, !packets.isEmpty {
self?.maybeRenegotiate()
// log.verbose("Received \(packets.count) packets from LINK")
self?.receiveLink(packets: packets)
}
}
}
// Ruby: tun_loop
private func loopTunnel() {
tunnel?.setReadHandler(queue: queue) { [weak self] (newPackets, error) in
if let error = error {
log.error("Failed TUN read: \(error)")
return
}
if let packets = newPackets, !packets.isEmpty {
// log.verbose("Received \(packets.count) packets from \(self.tunnelName)")
self?.receiveTunnel(packets: packets)
}
}
}
// Ruby: recv_link
private func receiveLink(packets: [Data]) {
guard shouldHandlePackets() else {
return
}
2018-09-09 12:55:14 +00:00
lastPing.inbound = Date()
2018-08-23 08:19:25 +00:00
var dataPacketsByKey = [UInt8: [Data]]()
for packet in packets {
// log.verbose("Received data from LINK (\(packet.count) bytes): \(packet.toHex())")
guard let firstByte = packet.first else {
log.warning("Dropped malformed packet (missing opcode)")
2018-08-23 08:19:25 +00:00
continue
}
let codeValue = firstByte >> 3
guard let code = PacketCode(rawValue: codeValue) else {
log.warning("Dropped malformed packet (unknown code: \(codeValue))")
continue
}
// log.verbose("Parsed packet with code \(code)")
2018-08-23 08:19:25 +00:00
var offset = 1
if (code == .dataV2) {
guard packet.count >= offset + PacketPeerIdLength else {
2018-08-23 08:19:25 +00:00
log.warning("Dropped malformed packet (missing peerId)")
continue
}
offset += PacketPeerIdLength
2018-08-23 08:19:25 +00:00
}
if (code == .dataV1) || (code == .dataV2) {
let key = firstByte & 0b111
2018-08-23 08:19:25 +00:00
guard let _ = keys[key] else {
log.error("Key with id \(key) not found")
deferStop(.shutdown, SessionError.badKey)
return
}
// XXX: improve with array reference
var dataPackets = dataPacketsByKey[key] ?? [Data]()
dataPackets.append(packet)
dataPacketsByKey[key] = dataPackets
continue
}
let controlPacket: ControlPacket
do {
let parsedPacket = try controlChannel.readInboundPacket(withData: packet, offset: 0)
handleAcks()
if parsedPacket.code == .ackV1 {
2018-08-23 08:19:25 +00:00
continue
}
controlPacket = parsedPacket
} catch let e {
log.warning("Dropped malformed packet: \(e)")
2018-08-23 08:19:25 +00:00
continue
// deferStop(.shutdown, e)
// return
2018-08-23 08:19:25 +00:00
}
if (code == .hardResetServerV2) && (negotiationKey.controlState == .connected) {
deferStop(.shutdown, SessionError.staleSession)
return
} else if (code == .softResetV1) && (negotiationKey.state != .softReset) {
2018-10-24 08:40:48 +00:00
softReset(isServerInitiated: true)
}
2018-08-23 08:19:25 +00:00
sendAck(for: controlPacket)
2018-08-23 08:19:25 +00:00
let pendingInboundQueue = controlChannel.enqueueInboundPacket(packet: controlPacket)
for inboundPacket in pendingInboundQueue {
handleControlPacket(inboundPacket)
2018-08-23 08:19:25 +00:00
}
}
// send decrypted packets to tunnel all at once
for (keyId, dataPackets) in dataPacketsByKey {
guard let sessionKey = keys[keyId] else {
log.warning("Accounted a data packet for which the cryptographic key hadn't been found")
continue
}
handleDataPackets(dataPackets, key: sessionKey)
}
}
// Ruby: recv_tun
private func receiveTunnel(packets: [Data]) {
guard shouldHandlePackets() else {
return
}
sendDataPackets(packets)
2018-09-09 12:55:14 +00:00
lastPing.outbound = Date()
2018-08-23 08:19:25 +00:00
}
// Ruby: ping
private func ping() {
guard (currentKey?.controlState == .connected) else {
return
}
let now = Date()
2018-09-09 12:55:14 +00:00
guard (now.timeIntervalSince(lastPing.inbound) <= CoreConfiguration.pingTimeout) else {
2018-08-23 08:19:25 +00:00
deferStop(.shutdown, SessionError.pingTimeout)
return
}
2018-09-08 18:29:51 +00:00
// postpone ping if elapsed less than keep-alive
if let interval = keepAliveInterval {
2018-09-09 12:55:14 +00:00
let elapsed = now.timeIntervalSince(lastPing.outbound)
2018-08-23 08:19:25 +00:00
guard (elapsed >= interval) else {
2018-09-08 18:29:51 +00:00
scheduleNextPing(elapsed: elapsed)
2018-08-23 08:19:25 +00:00
return
}
}
log.debug("Send ping")
sendDataPackets([DataPacket.pingString])
2018-09-09 12:55:14 +00:00
lastPing.outbound = Date()
2018-08-23 08:19:25 +00:00
2018-09-08 18:29:51 +00:00
scheduleNextPing()
}
private func scheduleNextPing(elapsed: TimeInterval = 0.0) {
guard let interval = keepAliveInterval else {
return
}
let remaining = min(interval, interval - elapsed)
queue.asyncAfter(deadline: .now() + remaining) { [weak self] in
self?.ping()
2018-08-23 08:19:25 +00:00
}
}
// MARK: Handshake
// Ruby: reset_ctrl
2018-09-09 15:56:29 +00:00
private func resetControlChannel(forNewSession: Bool) {
2018-08-23 08:19:25 +00:00
authenticator = nil
2018-09-09 15:56:29 +00:00
do {
try controlChannel.reset(forNewSession: forNewSession)
} catch let e {
deferStop(.shutdown, e)
}
2018-08-23 08:19:25 +00:00
}
// Ruby: hard_reset
private func hardReset() {
log.debug("Send hard reset")
2018-09-09 15:56:29 +00:00
resetControlChannel(forNewSession: true)
2019-04-16 21:55:50 +00:00
continuatedPushReplyMessage = nil
pushReply = nil
2018-08-23 08:19:25 +00:00
negotiationKeyIdx = 0
let newKey = SessionKey(id: UInt8(negotiationKeyIdx))
keys[negotiationKeyIdx] = newKey
log.debug("Negotiation key index is \(negotiationKeyIdx)")
let payload = hardResetPayload() ?? Data()
2018-08-23 08:19:25 +00:00
negotiationKey.state = .hardReset
guard !keys.isEmpty else {
fatalError("Main loop must follow hard reset, keys are empty!")
}
loopNegotiation()
enqueueControlPackets(code: .hardResetClientV2, key: UInt8(negotiationKeyIdx), payload: payload)
}
private func hardResetPayload() -> Data? {
guard !(configuration.usesPIAPatches ?? false) else {
let caMD5: String
do {
caMD5 = try TLSBox.md5(forCertificatePath: caURL.path)
} catch {
log.error("CA MD5 could not be computed, skipping custom HARD_RESET")
return nil
}
log.debug("CA MD5 is: \(caMD5)")
return try? PIAHardReset(
caMd5Digest: caMD5,
cipher: configuration.fallbackCipher,
digest: configuration.fallbackDigest
).encodedData()
}
return nil
2018-08-23 08:19:25 +00:00
}
// Ruby: soft_reset
2018-10-24 08:40:48 +00:00
private func softReset(isServerInitiated: Bool) {
if isServerInitiated {
log.debug("Handle soft reset")
} else {
log.debug("Send soft reset")
}
2018-08-23 08:19:25 +00:00
2018-09-09 15:56:29 +00:00
resetControlChannel(forNewSession: false)
2018-08-23 08:19:25 +00:00
negotiationKeyIdx = max(1, (negotiationKeyIdx + 1) % ProtocolMacros.numberOfKeys)
let newKey = SessionKey(id: UInt8(negotiationKeyIdx))
keys[negotiationKeyIdx] = newKey
log.debug("Negotiation key index is \(negotiationKeyIdx)")
negotiationKey.state = .softReset
negotiationKey.softReset = true
loopNegotiation()
2018-10-24 08:40:48 +00:00
if !isServerInitiated {
enqueueControlPackets(code: .softResetV1, key: UInt8(negotiationKeyIdx), payload: Data())
}
2018-08-23 08:19:25 +00:00
}
// Ruby: on_tls_connect
private func onTLSConnect() {
log.debug("TLS.connect: Handshake is complete")
negotiationKey.controlState = .preAuth
do {
authenticator = try Authenticator(credentials?.username, pushReply?.options.authToken ?? credentials?.password)
try authenticator?.putAuth(into: negotiationKey.tls, options: configuration)
2018-08-23 08:19:25 +00:00
} catch let e {
deferStop(.shutdown, e)
return
}
2018-10-23 20:37:29 +00:00
let cipherTextOut: Data
do {
cipherTextOut = try negotiationKey.tls.pullCipherText()
2018-10-23 20:44:35 +00:00
} catch let e {
if let _ = e.tunnelKitErrorCode() {
log.error("TLS.auth: Failed pulling ciphertext (error: \(e))")
shutdown(error: e)
return
}
2018-08-23 08:19:25 +00:00
log.verbose("TLS.auth: Still can't pull ciphertext")
return
}
log.debug("TLS.auth: Pulled ciphertext (\(cipherTextOut.count) bytes)")
enqueueControlPackets(code: .controlV1, key: negotiationKey.id, payload: cipherTextOut)
}
// Ruby: push_request
private func pushRequest() {
guard negotiationKey.controlState == .preIfConfig else {
2018-08-23 08:19:25 +00:00
return
}
guard let targetDate = nextPushRequestDate, Date() > targetDate else {
return
2018-08-23 08:19:25 +00:00
}
log.debug("TLS.ifconfig: Put plaintext (PUSH_REQUEST)")
try? negotiationKey.tls.putPlainText("PUSH_REQUEST\0")
2018-10-23 20:37:29 +00:00
let cipherTextOut: Data
do {
cipherTextOut = try negotiationKey.tls.pullCipherText()
2018-10-23 20:44:35 +00:00
} catch let e {
if let _ = e.tunnelKitErrorCode() {
log.error("TLS.auth: Failed pulling ciphertext (error: \(e))")
shutdown(error: e)
return
}
2018-08-23 08:19:25 +00:00
log.verbose("TLS.ifconfig: Still can't pull ciphertext")
return
}
log.debug("TLS.ifconfig: Send pulled ciphertext (\(cipherTextOut.count) bytes)")
enqueueControlPackets(code: .controlV1, key: negotiationKey.id, payload: cipherTextOut)
if negotiationKey.softReset {
completeConnection()
2018-08-23 08:19:25 +00:00
}
nextPushRequestDate = Date().addingTimeInterval(CoreConfiguration.pushRequestInterval)
2018-08-23 08:19:25 +00:00
}
private func maybeRenegotiate() {
2018-09-06 23:23:51 +00:00
guard let renegotiatesAfter = configuration.renegotiatesAfter, renegotiatesAfter > 0 else {
2018-08-23 08:19:25 +00:00
return
}
guard (negotiationKeyIdx == currentKeyIdx) else {
return
}
let elapsed = -negotiationKey.startTime.timeIntervalSinceNow
if (elapsed > renegotiatesAfter) {
log.debug("Renegotiating after \(elapsed) seconds")
2018-10-24 08:40:48 +00:00
softReset(isServerInitiated: false)
2018-08-23 08:19:25 +00:00
}
}
private func completeConnection() {
setupEncryption()
authenticator = nil
negotiationKey.controlState = .connected
connectedDate = Date()
transitionKeys()
}
2018-08-23 08:19:25 +00:00
// MARK: Control
// Ruby: handle_ctrl_pkt
private func handleControlPacket(_ packet: ControlPacket) {
2018-10-24 08:40:48 +00:00
guard packet.key == negotiationKey.id else {
2018-08-23 08:19:25 +00:00
log.error("Bad key in control packet (\(packet.key) != \(negotiationKey.id))")
// deferStop(.shutdown, SessionError.badKey)
return
}
2018-10-24 08:40:48 +00:00
// start new TLS handshake
if ((packet.code == .hardResetServerV2) && (negotiationKey.state == .hardReset)) ||
((packet.code == .softResetV1) && (negotiationKey.state == .softReset)) {
if negotiationKey.state == .hardReset {
2018-09-09 15:56:29 +00:00
controlChannel.remoteSessionId = packet.sessionId
2018-08-23 08:19:25 +00:00
}
2018-09-09 15:56:29 +00:00
guard let remoteSessionId = controlChannel.remoteSessionId else {
log.error("No remote sessionId (never set)")
2018-08-23 08:19:25 +00:00
deferStop(.shutdown, SessionError.missingSessionId)
return
}
guard packet.sessionId == remoteSessionId else {
log.error("Packet session mismatch (\(packet.sessionId.toHex()) != \(remoteSessionId.toHex()))")
2018-08-23 08:19:25 +00:00
deferStop(.shutdown, SessionError.sessionMismatch)
return
}
negotiationKey.state = .tls
log.debug("Start TLS handshake")
2018-08-23 15:24:39 +00:00
negotiationKey.tlsOptional = TLSBox(
caPath: caURL.path,
clientCertificatePath: (configuration.clientCertificate != nil) ? clientCertificateURL.path : nil,
clientKeyPath: (configuration.clientKey != nil) ? clientKeyURL.path : nil,
2019-03-18 16:27:48 +00:00
checksEKU: configuration.checksEKU ?? false
2018-08-23 15:24:39 +00:00
)
2018-08-23 08:19:25 +00:00
do {
try negotiationKey.tls.start()
2018-08-23 08:19:25 +00:00
} catch let e {
deferStop(.shutdown, e)
return
}
2018-10-23 20:37:29 +00:00
let cipherTextOut: Data
do {
cipherTextOut = try negotiationKey.tls.pullCipherText()
2018-10-23 20:44:35 +00:00
} catch let e {
if let _ = e.tunnelKitErrorCode() {
log.error("TLS.connect: Failed pulling ciphertext (error: \(e))")
shutdown(error: e)
return
}
deferStop(.shutdown, e)
2018-08-23 08:19:25 +00:00
return
}
log.debug("TLS.connect: Pulled ciphertext (\(cipherTextOut.count) bytes)")
enqueueControlPackets(code: .controlV1, key: negotiationKey.id, payload: cipherTextOut)
}
2018-10-24 08:40:48 +00:00
// exchange TLS ciphertext
2018-08-23 08:19:25 +00:00
else if ((packet.code == .controlV1) && (negotiationKey.state == .tls)) {
2018-09-09 15:56:29 +00:00
guard let remoteSessionId = controlChannel.remoteSessionId else {
log.error("No remote sessionId found in packet (control packets before server HARD_RESET)")
2018-08-23 08:19:25 +00:00
deferStop(.shutdown, SessionError.missingSessionId)
return
}
guard packet.sessionId == remoteSessionId else {
log.error("Packet session mismatch (\(packet.sessionId.toHex()) != \(remoteSessionId.toHex()))")
2018-08-23 08:19:25 +00:00
deferStop(.shutdown, SessionError.sessionMismatch)
return
}
guard let cipherTextIn = packet.payload else {
log.warning("TLS.connect: Control packet with empty payload?")
return
}
log.debug("TLS.connect: Put received ciphertext (\(cipherTextIn.count) bytes)")
try? negotiationKey.tls.putCipherText(cipherTextIn)
2018-10-23 20:37:29 +00:00
let cipherTextOut: Data
do {
cipherTextOut = try negotiationKey.tls.pullCipherText()
2018-08-23 08:19:25 +00:00
log.debug("TLS.connect: Send pulled ciphertext (\(cipherTextOut.count) bytes)")
enqueueControlPackets(code: .controlV1, key: negotiationKey.id, payload: cipherTextOut)
2018-10-23 20:44:35 +00:00
} catch let e {
if let _ = e.tunnelKitErrorCode() {
log.error("TLS.connect: Failed pulling ciphertext (error: \(e))")
shutdown(error: e)
return
}
2018-10-23 20:37:29 +00:00
log.verbose("TLS.connect: No available ciphertext to pull")
2018-08-23 08:19:25 +00:00
}
if negotiationKey.shouldOnTLSConnect() {
onTLSConnect()
}
do {
while true {
let controlData = try controlChannel.currentControlData(withTLS: negotiationKey.tls)
handleControlData(controlData)
}
2018-08-23 08:19:25 +00:00
} catch _ {
}
}
}
// Ruby: handle_ctrl_data
private func handleControlData(_ data: ZeroingData) {
guard let auth = authenticator else {
return
}
2018-08-23 08:19:25 +00:00
if CoreConfiguration.logsSensitiveData {
log.debug("Pulled plain control data (\(data.count) bytes): \(data.toHex())")
} else {
log.debug("Pulled plain control data (\(data.count) bytes)")
}
auth.appendControlData(data)
if (negotiationKey.controlState == .preAuth) {
do {
guard try auth.parseAuthReply() else {
return
}
} catch let e {
deferStop(.shutdown, e)
return
}
negotiationKey.controlState = .preIfConfig
nextPushRequestDate = Date().addingTimeInterval(negotiationKey.softReset ? CoreConfiguration.softResetDelay : CoreConfiguration.retransmissionLimit)
pushRequest()
}
for message in auth.parseMessages() {
if CoreConfiguration.logsSensitiveData {
log.debug("Parsed control message (\(message.count) bytes): \"\(message)\"")
} else {
log.debug("Parsed control message (\(message.count) bytes)")
}
handleControlMessage(message)
}
}
// Ruby: handle_ctrl_msg
private func handleControlMessage(_ message: String) {
guard !message.hasPrefix("AUTH_FAILED") else {
deferStop(.shutdown, SessionError.badCredentials)
return
}
guard (negotiationKey.controlState == .preIfConfig) else {
return
}
if CoreConfiguration.logsSensitiveData {
log.debug("Received control message: \"\(message)\"")
}
2018-08-23 08:19:25 +00:00
2019-04-16 21:55:50 +00:00
let completeMessage: String
if let continuated = continuatedPushReplyMessage {
completeMessage = "\(continuated),\(message)"
} else {
completeMessage = message
}
2018-08-23 08:19:25 +00:00
let reply: PushReply
do {
2019-04-16 21:55:50 +00:00
guard let optionalReply = try PushReply(message: completeMessage) else {
2018-08-23 08:19:25 +00:00
return
}
reply = optionalReply
2018-10-24 16:25:04 +00:00
log.debug("Received PUSH_REPLY: \"\(reply.maskedDescription)\"")
if let framing = reply.options.compressionFraming, let compression = reply.options.compressionAlgorithm {
2019-03-19 22:17:04 +00:00
switch compression {
case .disabled:
break
2019-03-19 22:17:04 +00:00
case .LZO:
if !LZOIsSupported() {
2019-03-19 22:17:04 +00:00
log.error("Server has LZO compression enabled and this was not built into the library (framing=\(framing))")
throw SessionError.serverCompression
}
2019-03-19 22:17:04 +00:00
case .other:
log.error("Server has non-LZO compression enabled and this is currently unsupported (framing=\(framing))")
throw SessionError.serverCompression
}
}
2019-04-16 21:55:50 +00:00
} catch SessionError.continuationPushReply {
continuatedPushReplyMessage = completeMessage.replacingOccurrences(of: "push-continuation", with: "")
// FIXME: strip "PUSH_REPLY" and "push-continuation 2"
return
2018-08-23 08:19:25 +00:00
} catch let e {
deferStop(.shutdown, e)
return
}
pushReply = reply
guard reply.options.ipv4 != nil || reply.options.ipv6 != nil else {
deferStop(.shutdown, SessionError.noRouting)
return
}
completeConnection()
2018-08-23 08:19:25 +00:00
guard let remoteAddress = link?.remoteAddress else {
fatalError("Could not resolve link remote address")
}
delegate?.sessionDidStart(self, remoteAddress: remoteAddress, reply: reply)
2018-08-23 08:19:25 +00:00
2018-09-08 18:29:51 +00:00
scheduleNextPing()
2018-08-23 08:19:25 +00:00
}
// Ruby: transition_keys
private func transitionKeys() {
if let key = currentKey {
oldKeys.append(key)
}
currentKeyIdx = negotiationKeyIdx
cleanKeys()
}
// Ruby: clean_keys
private func cleanKeys() {
while (oldKeys.count > 1) {
let key = oldKeys.removeFirst()
keys.removeValue(forKey: key.id)
}
}
// Ruby: q_ctrl
private func enqueueControlPackets(code: PacketCode, key: UInt8, payload: Data) {
guard let link = link else {
log.warning("Not writing to LINK, interface is down")
return
}
2018-09-09 15:56:29 +00:00
controlChannel.enqueueOutboundPackets(withCode: code, key: key, payload: payload, maxPacketSize: link.mtu)
2018-08-23 08:19:25 +00:00
flushControlQueue()
}
// Ruby: flush_ctrl_q_out
private func flushControlQueue() {
let rawList: [Data]
do {
rawList = try controlChannel.writeOutboundPackets()
} catch let e {
log.warning("Failed control packet serialization: \(e)")
deferStop(.shutdown, e)
return
}
for raw in rawList {
2018-08-23 08:19:25 +00:00
log.debug("Send control packet (\(raw.count) bytes): \(raw.toHex())")
}
// WARNING: runs in Network.framework queue
link?.writePackets(rawList) { [weak self] (error) in
if let error = error {
self?.queue.sync {
log.error("Failed LINK write during control flush: \(error)")
self?.deferStop(.shutdown, SessionError.failedLinkWrite)
2018-08-23 08:19:25 +00:00
}
2019-03-20 16:18:08 +00:00
return
2018-08-23 08:19:25 +00:00
}
}
}
// Ruby: setup_keys
private func setupEncryption() {
2018-08-23 08:19:25 +00:00
guard let auth = authenticator else {
2018-09-01 23:39:02 +00:00
fatalError("Setting up encryption without having authenticated")
2018-08-23 08:19:25 +00:00
}
2018-09-09 15:56:29 +00:00
guard let sessionId = controlChannel.sessionId else {
2018-09-01 23:39:02 +00:00
fatalError("Setting up encryption without a local sessionId")
2018-08-23 08:19:25 +00:00
}
2018-09-09 15:56:29 +00:00
guard let remoteSessionId = controlChannel.remoteSessionId else {
2018-09-01 23:39:02 +00:00
fatalError("Setting up encryption without a remote sessionId")
2018-08-23 08:19:25 +00:00
}
guard let serverRandom1 = auth.serverRandom1, let serverRandom2 = auth.serverRandom2 else {
2018-09-01 23:39:02 +00:00
fatalError("Setting up encryption without server randoms")
2018-08-23 08:19:25 +00:00
}
2018-09-01 23:39:02 +00:00
guard let pushReply = pushReply else {
fatalError("Setting up encryption without a former PUSH_REPLY")
}
2018-08-23 08:19:25 +00:00
if CoreConfiguration.logsSensitiveData {
2018-09-01 23:39:02 +00:00
log.debug("Set up encryption from the following components:")
2018-08-23 08:19:25 +00:00
log.debug("\tpreMaster: \(auth.preMaster.toHex())")
log.debug("\trandom1: \(auth.random1.toHex())")
log.debug("\trandom2: \(auth.random2.toHex())")
log.debug("\tserverRandom1: \(serverRandom1.toHex())")
log.debug("\tserverRandom2: \(serverRandom2.toHex())")
log.debug("\tsessionId: \(sessionId.toHex())")
log.debug("\tremoteSessionId: \(remoteSessionId.toHex())")
} else {
2018-09-01 23:39:02 +00:00
log.debug("Set up encryption")
}
let pushedCipher = pushReply.options.cipher
if let negCipher = pushedCipher {
log.info("\tNegotiated cipher: \(negCipher.rawValue)")
}
let pushedFraming = pushReply.options.compressionFraming
if let negFraming = pushedFraming {
log.info("\tNegotiated compression framing: \(negFraming)")
}
let pushedCompression = pushReply.options.compressionAlgorithm
if let negCompression = pushedCompression {
log.info("\tNegotiated compression algorithm: \(negCompression)")
}
if let negPing = pushReply.options.keepAliveInterval {
log.info("\tNegotiated keep-alive: \(negPing) seconds")
2018-08-23 08:19:25 +00:00
}
let bridge: EncryptionBridge
2018-08-23 08:19:25 +00:00
do {
bridge = try EncryptionBridge(
pushedCipher ?? configuration.fallbackCipher,
configuration.fallbackDigest,
auth,
sessionId,
remoteSessionId
)
2018-08-23 08:19:25 +00:00
} catch let e {
deferStop(.shutdown, e)
return
}
negotiationKey.dataPath = DataPath(
encrypter: bridge.encrypter(),
decrypter: bridge.decrypter(),
peerId: pushReply.options.peerId ?? PacketPeerIdDisabled,
compressionFraming: (pushedFraming ?? configuration.fallbackCompressionFraming).native,
compressionAlgorithm: (pushedCompression ?? configuration.compressionAlgorithm ?? .disabled).native,
2018-08-23 08:19:25 +00:00
maxPackets: link?.packetBufferSize ?? 200,
usesReplayProtection: CoreConfiguration.usesReplayProtection
)
}
// MARK: Data
// Ruby: handle_data_pkt
private func handleDataPackets(_ packets: [Data], key: SessionKey) {
controlChannel.addReceivedDataCount(packets.flatCount)
2018-08-23 08:19:25 +00:00
do {
guard let decryptedPackets = try key.decrypt(packets: packets) else {
log.warning("Could not decrypt packets, is SessionKey properly configured (dataPath, peerId)?")
return
}
guard !decryptedPackets.isEmpty else {
return
}
tunnel?.writePackets(decryptedPackets, completionHandler: nil)
} catch let e {
2018-10-23 20:44:35 +00:00
guard !e.isTunnelKitError() else {
2018-08-23 08:19:25 +00:00
deferStop(.shutdown, e)
return
}
deferStop(.reconnect, e)
}
}
// Ruby: send_data_pkt
private func sendDataPackets(_ packets: [Data]) {
guard let key = currentKey else {
return
}
do {
guard let encryptedPackets = try key.encrypt(packets: packets) else {
log.warning("Could not encrypt packets, is SessionKey properly configured (dataPath, peerId)?")
return
}
guard !encryptedPackets.isEmpty else {
return
}
// WARNING: runs in Network.framework queue
controlChannel.addSentDataCount(encryptedPackets.flatCount)
2018-08-23 08:19:25 +00:00
link?.writePackets(encryptedPackets) { [weak self] (error) in
if let error = error {
self?.queue.sync {
log.error("Data: Failed LINK write during send data: \(error)")
self?.deferStop(.shutdown, SessionError.failedLinkWrite)
2018-08-23 08:19:25 +00:00
}
2019-03-20 16:18:08 +00:00
return
2018-08-23 08:19:25 +00:00
}
// log.verbose("Data: \(encryptedPackets.count) packets successfully written to LINK")
}
} catch let e {
2018-10-23 20:44:35 +00:00
guard !e.isTunnelKitError() else {
2018-08-23 08:19:25 +00:00
deferStop(.shutdown, e)
return
}
deferStop(.reconnect, e)
}
}
// MARK: Acks
private func handleAcks() {
2018-08-23 08:19:25 +00:00
}
// Ruby: send_ack
private func sendAck(for controlPacket: ControlPacket) {
log.debug("Send ack for received packetId \(controlPacket.packetId)")
2018-08-23 08:19:25 +00:00
2018-09-09 15:56:29 +00:00
let raw: Data
do {
raw = try controlChannel.writeAcks(
withKey: controlPacket.key,
ackPacketIds: [controlPacket.packetId],
ackRemoteSessionId: controlPacket.sessionId
)
2018-09-09 15:56:29 +00:00
} catch let e {
deferStop(.shutdown, e)
return
}
2018-08-23 08:19:25 +00:00
// WARNING: runs in Network.framework queue
link?.writePacket(raw) { [weak self] (error) in
if let error = error {
self?.queue.sync {
log.error("Failed LINK write during send ack for packetId \(controlPacket.packetId): \(error)")
self?.deferStop(.shutdown, SessionError.failedLinkWrite)
2018-08-23 08:19:25 +00:00
}
2019-03-20 16:18:08 +00:00
return
2018-08-23 08:19:25 +00:00
}
log.debug("Ack successfully written to LINK for packetId \(controlPacket.packetId)")
2018-08-23 08:19:25 +00:00
}
}
// MARK: Stop
private func shouldHandlePackets() -> Bool {
return (!isStopping && !keys.isEmpty)
}
private func deferStop(_ method: StopMethod, _ error: Error?) {
isStopping = true
let completion = { [weak self] in
switch method {
case .shutdown:
self?.doShutdown(error: error)
case .reconnect:
self?.doReconnect(error: error)
}
}
// shut down after sending exit notification if socket is unreliable (normally UDP)
if let link = link, !link.isReliable {
do {
guard let packets = try currentKey?.encrypt(packets: [OCCPacket.exit.serialized()]) else {
completion()
return
}
2019-03-20 17:01:57 +00:00
link.writePackets(packets) { [weak self] (error) in
self?.queue.sync {
completion()
}
}
} catch {
completion()
}
} else {
completion()
2018-08-23 08:19:25 +00:00
}
}
private func doShutdown(error: Error?) {
if let error = error {
log.error("Trigger shutdown (error: \(error))")
} else {
log.info("Trigger shutdown on request")
}
stopError = error
delegate?.sessionDidStop(self, shouldReconnect: false)
}
private func doReconnect(error: Error?) {
if let error = error {
log.error("Trigger reconnection (error: \(error))")
} else {
log.info("Trigger reconnection on request")
}
stopError = error
delegate?.sessionDidStop(self, shouldReconnect: true)
}
}